# Explore Access Paths and Activity

Teleport Identity Security helps teams expose and eliminate hidden risk in their infrastructure.

These are some use cases for Teleport Identity Security:

- Find users with the highest standing privilege with the Standing Privilege Dashboard.
- Visually understand which resources a user can access and which users and bots can access a resource.
- Quickly query key access pathways with SQL Editor.
- Know when access pathways change for a critical asset with Crown Jewel Alerting.
- Investigate identity breaches by correlating audit logs from across your infrastructure.

## Guides

- [Alerts](https://goteleport.com/docs/identity-security/usage/alerts.md): Describes the pre-built security detections that trigger alerts in Teleport Identity Security.
- [Crown Jewels](https://goteleport.com/docs/identity-security/usage/crown-jewels.md): Describes how to use Access Graph Crown Jewels to see permission changes in Teleport.
- [Graph Explorer](https://goteleport.com/docs/identity-security/usage/graph-explorer.md): Describes the Graph Explorer view of Teleport Access Graph.
- [Investigate](https://goteleport.com/docs/identity-security/usage/investigate.md): Describes the Investigate view, which helps you explore identity-related activity from across your infrastructure.
- [SQL Editor](https://goteleport.com/docs/identity-security/usage/sql-editor.md): Describes the SQL Editor view of Teleport Access Graph.
- [Standing Privileges](https://goteleport.com/docs/identity-security/usage/dashboard.md): Describes the Standing Privileges Dashboard feature of Teleport Identity Security
